General
-
Target
30d70d6308a3674a53bebfd66ef948ceecaa98479644353a9d5f1eaa6e0c98f9.exe
-
Size
1.7MB
-
Sample
241121-yc69ssvrgw
-
MD5
badfc41774fde8cc7f489adc49fe0f23
-
SHA1
34188f6a31761c58d5d68242861478b080b355cb
-
SHA256
30d70d6308a3674a53bebfd66ef948ceecaa98479644353a9d5f1eaa6e0c98f9
-
SHA512
0a0b57fb2c70815844e3e33ca193c44dd885ea70c0c58149e04c543f809e48961eded4a1cd1eb159425b2456474e75edb77623e4f102244fa5a4d1107e8eabfa
-
SSDEEP
24576:2mUiRAmjMLSR3wVtv9jy3wDeSSfKXIpuEZOaP9dOl2s4g3deQSiuKfDekBbzy2cx:2X+MLS5ktcueSaK/EFje3u0Ccz5Ur
Static task
static1
Behavioral task
behavioral1
Sample
30d70d6308a3674a53bebfd66ef948ceecaa98479644353a9d5f1eaa6e0c98f9.exe
Resource
win7-20240729-en
Malware Config
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
30d70d6308a3674a53bebfd66ef948ceecaa98479644353a9d5f1eaa6e0c98f9.exe
-
Size
1.7MB
-
MD5
badfc41774fde8cc7f489adc49fe0f23
-
SHA1
34188f6a31761c58d5d68242861478b080b355cb
-
SHA256
30d70d6308a3674a53bebfd66ef948ceecaa98479644353a9d5f1eaa6e0c98f9
-
SHA512
0a0b57fb2c70815844e3e33ca193c44dd885ea70c0c58149e04c543f809e48961eded4a1cd1eb159425b2456474e75edb77623e4f102244fa5a4d1107e8eabfa
-
SSDEEP
24576:2mUiRAmjMLSR3wVtv9jy3wDeSSfKXIpuEZOaP9dOl2s4g3deQSiuKfDekBbzy2cx:2X+MLS5ktcueSaK/EFje3u0Ccz5Ur
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-